Multipartite Secret Sharing by Bivariate Interpolation

被引:0
|
作者
Tamir Tassa
Nira Dyn
机构
[1] The Open University,Division of Computer Science
[2] Tel Aviv University,Department of Applied Mathematics
来源
Journal of Cryptology | 2009年 / 22卷
关键词
Secret sharing; Multipartite access structures; Compartmented access structures; Hierarchical threshold access structures; Bivariate interpolation; Monotone span programs;
D O I
暂无
中图分类号
学科分类号
摘要
Given a set of participants that is partitioned into distinct compartments, a multipartite access structure is an access structure that does not distinguish between participants belonging to the same compartment. We examine here three types of such access structures: two that were studied before, compartmented access structures and hierarchical threshold access structures, and a new type of compartmented access structures that we present herein. We design ideal perfect secret sharing schemes for these types of access structures that are based on bivariate interpolation. The secret sharing schemes for the two types of compartmented access structures are based on bivariate Lagrange interpolation with data on parallel lines. The secret sharing scheme for the hierarchical threshold access structures is based on bivariate Lagrange interpolation with data on lines in general position. The main novelty of this paper is the introduction of bivariate Lagrange interpolation and its potential power in designing schemes for multipartite settings, as different compartments may be associated with different lines or curves in the plane. In particular, we show that the introduction of a second dimension may create the same hierarchical effect as polynomial derivatives and Birkhoff interpolation were shown to do in Tassa (J. Cryptol. 20:237–264, 2007).
引用
收藏
页码:227 / 258
页数:31
相关论文
共 50 条
  • [41] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Wu, Chi-Ming
    Sun, Qin-Dong
    Bi, Wei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 18653 - 18667
  • [42] Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation
    Yang, Ching-Nung
    Wu, Xiaotian
    Lin, Hsuan-Yu
    Kim, Cheonshik
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [43] Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing Scheme
    Zhang Yanshuo
    Liu Zhuojun
    Huang Guifang
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 447 - +
  • [44] Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation
    Ballico, E.
    Boato, G.
    Fontanari, C.
    Granelli, F.
    ADVANCES IN COMPUTER, INFORMATION, AND SYSTEMS SCIENCES AND ENGINEERING, 2006, : 157 - +
  • [45] An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure
    Shi, Runhua
    Huang, Liusheng
    Yang, Wei
    Zhong, Hong
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 151 - 154
  • [46] Quantum Secret Sharing Among Four Players Using Multipartite Bound Entanglement of an Optical Field
    Zhou, Yaoyao
    Yu, Juan
    Yan, Zhihui
    Jia, Xiaojun
    Zhang, Jing
    Xie, Changde
    Peng, Kunchi
    PHYSICAL REVIEW LETTERS, 2018, 121 (15)
  • [47] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Fulin Li
    Yang Liu
    Jiayun Yan
    Shixin Zhu
    Cryptography and Communications, 2022, 14 : 1039 - 1053
  • [48] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Li, Fulin
    Liu, Yang
    Yan, Jiayun
    Zhu, Shixin
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (05): : 1039 - 1053
  • [49] On a bivariate interpolation problem
    Hakopian, HA
    Ismail, SAM
    JOURNAL OF APPROXIMATION THEORY, 2002, 116 (01) : 76 - 99
  • [50] SINGULARITY OF BIVARIATE INTERPOLATION
    PASKOV, SH
    JOURNAL OF APPROXIMATION THEORY, 1992, 70 (01) : 50 - 67